/external/autotest/client/site_tests/platform_CryptohomeTestAuth/ |
platform_CryptohomeTestAuth.py | 12 from autotest_lib.client.cros import constants, cryptohome 22 user_hash = cryptohome.get_user_hash(test_user) 26 cryptohome.unmount_vault(test_user) 27 cryptohome.remove_vault(test_user) 33 cryptohome.mount_vault(test_user, test_password, create=True) 36 if not cryptohome.test_auth(test_user, test_password): 41 if cryptohome.test_auth(test_user, 'badpass'): 46 cryptohome.unmount_vault(test_user) 48 if cryptohome.is_vault_mounted(user=test_user, allow_fail=True): 49 raise error.TestFail('Cryptohome did not unmount the user.' [all...] |
control | 7 PURPOSE = "Verify that cryptohome can verify credentials." 8 CRITERIA = "This test will fail if cryptohome fails to validate credentials." 17 This test checks that cryptohome can verify credentials.
|
/external/autotest/client/site_tests/platform_CryptohomeKeyEviction/ |
platform_CryptohomeKeyEviction.py | 7 from autotest_lib.client.cros import cryptohome, pkcs11 10 """Ensure that the cryptohome properly manages key eviction from the tpm. 12 and then remounting a user's cryptohome. Mount requires use of the 13 user's cryptohome key, and thus the mount only succeeds if the 14 cryptohome key was properly evicted and reloaded into the TPM. 21 self._cryptohome_proxy = cryptohome.CryptohomeProxy() 29 # First we inject 30 tokens into chaps. This forces the cryptohome 34 # Then we get a user to remount his cryptohome. This process uses 35 # the cryptohome key, and if the user was able to login, the 36 # cryptohome key was correctly reloaded [all...] |
control | 17 Ensure that the cryptohome properly manages key eviction from 19 chaps, and then remounting a user's cryptohome. Mount requires use of the 20 user's cryptohome key, and thus the mount only succeeds if the 21 cryptohome key was properly evicted and reloaded into the TPM.
|
/external/autotest/client/site_tests/login_Cryptohome/ |
login_Cryptohome.py | 10 from autotest_lib.client.cros import cryptohome 16 """Verify the cryptohome is mounted only after login.""" 24 if not cryptohome.is_vault_mounted(user=username, 28 if cryptohome.is_vault_mounted(user=username, 35 cryptohome.remove_vault(username) 37 cryptohome.mount_vault(TEST_USER, TEST_PASS, create=True) 38 test_file = os.path.join(cryptohome.user_path(TEST_USER), 'hello') 40 cryptohome.unmount_vault(TEST_USER) 43 if not cryptohome.is_vault_mounted(user=username,
|
control | 7 PURPOSE = "Verify the cryptohome is mounted only after login." 9 This test will fail if cryptohome is mounted when not logged in, or vice versa. 20 This test checks that a cryptohome was mounted only after logging in.
|
/external/cros/system_api/ |
system_api.pc | 4 Libs: -lsystem_api-power_manager-protos -lsystem_api-cryptohome-protos -lsystem_api-protos
|
system_api.gyp | 62 'target_name': 'system_api-cryptohome-protos-gen', 65 'proto_in_dir': 'dbus/cryptohome', 66 'proto_out_dir': 'include/cryptohome/proto_bindings', 76 'target_name': 'system_api-cryptohome-protos', 80 'system_api-cryptohome-protos-gen', 83 '<(SHARED_INTERMEDIATE_DIR)/include/cryptohome/proto_bindings/key.pb.cc', 84 '<(SHARED_INTERMEDIATE_DIR)/include/cryptohome/proto_bindings/rpc.pb.cc', 85 '<(SHARED_INTERMEDIATE_DIR)/include/cryptohome/proto_bindings/signed_secret.pb.cc',
|
/external/autotest/client/site_tests/platform_CryptohomeMount/ |
platform_CryptohomeMount.py | 7 from autotest_lib.client.cros import cryptohome 10 """Validates basic cryptohome creation and mounting.""" 18 user_hash = cryptohome.get_user_hash(test_user) 19 proxy = cryptohome.CryptohomeProxy() 34 raise error.TestFail('Cryptohome mounted after unmount!') 39 raise error.TestFail('Cryptohome mounted with a bad password.') 42 raise error.TestFail('Cryptohome mounted even though mount() failed') 46 raise error.TestFail('Cryptohome could not clean up vault')
|
control | 16 This test checks that cryptohome can create and mount an encrypted vault.
|
/external/cros/system_api/constants/ |
cryptohome.h | 10 namespace cryptohome { namespace 15 } // namespace cryptohome
|
/external/autotest/client/site_tests/platform_CryptohomeSyncStress/ |
platform_CryptohomeSyncStress.py | 18 # make sure cryptohome is mounted 20 proxy = bus.get_object('org.chromium.Cryptohome', 21 '/org/chromium/Cryptohome') 22 cryptohome = dbus.Interface(proxy, 'org.chromium.CryptohomeInterface') 24 ismounted = cryptohome.IsMounted() 26 raise error.TestFail('Cryptohome failed to mount.')
|
/external/autotest/client/site_tests/platform_CryptohomeTPMReOwn/ |
platform_CryptohomeTPMReOwn.py | 10 Test of cryptohome functionality to re-create a user's vault directory if 35 output = self.__run_cmd("/usr/sbin/cryptohome --action=remove " + 39 output = self.__run_cmd("/usr/sbin/cryptohome " + 49 output = self.__run_cmd("/usr/sbin/cryptohome --action=mount" + 53 error_msg = "Cryptohome mount failed" 58 output = self.__run_cmd("/usr/sbin/cryptohome --action=unmount") 59 output = self.__run_cmd("/usr/sbin/cryptohome " + 62 error_msg = 'Cryptohome did not create a TPM-wrapped keyset.' 69 output = self.__run_cmd("/usr/sbin/cryptohome " + 79 output = self.__run_cmd("/usr/sbin/cryptohome --action=mount" [all...] |
/external/autotest/client/site_tests/platform_Attestation/ |
platform_Attestation.py | 7 from autotest_lib.client.cros import cryptohome 14 utils.system(cryptohome.CRYPTOHOME_CMD + 22 utils.system(cryptohome.CRYPTOHOME_CMD + 27 utils.system(cryptohome.CRYPTOHOME_CMD + 34 utils.system(cryptohome.CRYPTOHOME_CMD + 40 status = cryptohome.get_tpm_attestation_status() 44 status = cryptohome.get_tpm_attestation_status()
|
/external/autotest/client/site_tests/platform_CryptohomeChangePassword/ |
platform_CryptohomeChangePassword.py | 27 cmd = ('/usr/sbin/cryptohome --action=obfuscate_user --user=' 32 cmd = ('/usr/sbin/cryptohome --action=remove --force --user=' 37 raise error.TestFail('Cryptohome could not remove the test user.') 40 cmd = ('/usr/sbin/cryptohome --async --action=mount --user=' + test_user 45 raise error.TestFail('Cryptohome could not create the test user.') 47 cmd = ('/usr/sbin/cryptohome --action=is_mounted') 49 raise error.TestFail('Cryptohome created the user but did not mount.') 52 cmd = ('/usr/sbin/cryptohome --action=unmount') 55 cmd = ('/usr/sbin/cryptohome --action=is_mounted') 57 raise error.TestFail('Cryptohome did not unmount the user.' [all...] |
control | 7 PURPOSE = "Verify that cryptohome can change a password for an ecrypted vault." 8 CRITERIA = "This test will fail if cryptohome fails to re-wrap the vault key with the new password." 17 This test checks that cryptohome can change a password for an encrypted vault.
|
/external/autotest/client/site_tests/platform_BootLockbox/ |
platform_BootLockbox.py | 9 from autotest_lib.client.cros import cryptohome 36 status = cryptohome.get_tpm_status() 40 cryptohome.take_tpm_ownership() 41 status = cryptohome.get_tpm_status() 46 return utils.system(cryptohome.CRYPTOHOME_CMD + 51 return utils.system(cryptohome.CRYPTOHOME_CMD + 56 utils.system(cryptohome.CRYPTOHOME_CMD + ' --action=finalize_lockbox') 59 return utils.system(cryptohome.CRYPTOHOME_CMD + 64 utils.system(cryptohome.CRYPTOHOME_CMD + 68 return utils.system(cryptohome.CRYPTOHOME_CMD [all...] |
/external/autotest/client/site_tests/login_CryptohomeIncognito/ |
login_CryptohomeIncognito.py | 10 from autotest_lib.client.cros import cryptohome 18 if not cryptohome.is_guest_vault_mounted(): 22 if cryptohome.is_guest_vault_mounted(allow_fail=True):
|
/external/autotest/client/site_tests/platform_CryptohomeBadPerms/ |
control | 7 PURPOSE = "Tests Cryptohome's protection against bad directory permissions." 14 Tests Cryptohome's ability to detect directories with bad permissions or
|
platform_CryptohomeBadPerms.py | 9 from autotest_lib.client.cros import cryptohome 20 self.cryptohome_proxy = cryptohome.CryptohomeProxy() 24 path = cryptohome.user_path(user) 34 path = cryptohome.system_path(user) 45 path = cryptohome.user_path(user) 56 path = cryptohome.user_path(user) 66 path = cryptohome.user_path(user)
|
/external/autotest/client/site_tests/platform_CryptohomeNonDirs/ |
control | 7 PURPOSE = "Tests Cryptohome's protection against non-directory mounts." 14 Tests whether cryptohome correctly returns errors when non-directory components
|
platform_CryptohomeNonDirs.py | 9 from autotest_lib.client.cros import cryptohome 31 self.cryptohome_proxy = cryptohome.CryptohomeProxy() 35 path = cryptohome.user_path(user) 44 path = cryptohome.system_path(user) 53 path = cryptohome.user_path(user) 66 path = cryptohome.system_path(user)
|
/external/autotest/server/site_tests/platform_CryptohomeTPMReOwnServer/ |
control | 13 This test verifies that cryptohome re-creates a user's cryptohome directory
|
/external/autotest/client/site_tests/login_CryptohomeOwnerQuery/ |
login_CryptohomeOwnerQuery.py | 14 from autotest_lib.client.cros import cros_ui, cryptohome, ownership 17 """Verify that the cryptohome owner user query works properly.""" 32 self._cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop) 38 if cryptohome.get_login_status()['owner_user_exists']: 47 if not cryptohome.get_login_status()['owner_user_exists']:
|
/external/autotest/client/site_tests/platform_CryptohomeFio/ |
platform_CryptohomeFio.py | 8 from autotest_lib.client.cros import cryptohome 47 # Mount a test cryptohome vault. 49 cryptohome.mount_vault(TEST_USER, TEST_PASSWORD, 51 tmpdir = cryptohome.user_path(TEST_USER) 75 cryptohome.unmount_vault(TEST_USER) 76 cryptohome.remove_vault(TEST_USER)
|